Accelerate your SSE journey. Join Netskope at RSA.

  • Security Service Edge Products

    Protect against advanced and cloud-enabled threats and safeguard data across all vectors.

  • Borderless SD-WAN

    Confidently provide secure, high-performance access to every remote user, device, site, and cloud.

  • Platform

    Unrivaled visibility and real-time data and threat protection on the world's largest security private cloud.

Netskope Named a Leader in the 2022 Gartner Magic Quadrant™ for SSE Report

Get the report Go to Products Overview
Netskope gartner mq 2022 sse leader
Gartner® Quick Answer: How Does Netskope’s Acquisition of Infiot Impact SD-WAN, SASE, and SSE Projects?

Get the report
Gartner quick answer
Netskope delivers a modern cloud security stack, with unified capabilities for data and threat protection, plus secure private access.

Explore our platform
Birds eye view metropolitan city
Make the move to market-leading cloud security services with minimal latency and high reliability.

Learn more
Lighted highway through mountainside switchbacks
Prevent threats that often evade other security solutions using a single-pass SSE framework.

Learn more
Lighting storm over metropolitan area
Zero trust solutions for SSE and SASE deployments

Learn more
Boat driving through open sea
Netskope enables a safe, cloud-smart, and fast journey to adopt cloud services, apps, and public cloud infrastructure.

Learn more
Wind turbines along cliffside
  • Our Customers

    Netskope serves more than 2,000 customers worldwide including more than 25 of the Fortune 100

  • Customer Solutions

    We are here for you and with you every step of the way, ensuring your success with Netskope.

  • Training and Certification

    Netskope training will help you become a cloud security expert.

We help our customers to be Ready for Anything

See our Customers
Woman smiling with glasses looking out window
Netskope’s talented and experienced Professional Services team provides a prescriptive approach to your successful implementation.

Learn more
Netskope Professional Services
Secure your digital transformation journey and make the most of your cloud, web, and private applications with Netskope training.

Learn more
Group of young professionals working
  • Resources

    Learn more about how Netskope can help you secure your journey to the cloud.

  • Blog

    Learn how Netskope enables security and networking transformation through security service edge (SSE).

  • Events & Workshops

    Stay ahead of the latest security trends and connect with your peers.

  • Security Defined

    Everything you need to know in our cybersecurity encyclopedia.

Security Visionaries Podcast

Episode 10: Building Security Relationships Through Transparency
In this episode, Mike and Andreas discuss aligning with works councils, forging business relationships through transparency, and embedding security into value streams.

Play the podcast
Building Security Relationships Through Transparency
Read the latest on how Netskope can enable the Zero Trust and SASE journey through security service edge (SSE) capabilities.

Read the blog
Sunrise and cloudy sky
Netskope at RSA

Join Netskope at RSA Conference this year and be part of the real conversations on SASE and Zero Trust. Stop by our booth in South Hall, chat with an expert, register for our speaking sessions, and unwind by joining us at one of our events!

Learn more
RSA logo
What is Security Service Edge?

Explore the security side of SASE, the future of network and protection in the cloud.

Learn more
Four-way roundabout
  • Company

    We help you stay ahead of cloud, data, and network security challenges.

  • Why Netskope

    Cloud transformation and work from anywhere have changed how security needs to work.

  • Leadership

    Our leadership team is fiercely committed to doing everything it takes to make our customers successful.

  • Partners

    We partner with security leaders to help you secure your journey to the cloud.

Netskope enables the future of work.

Find out more
Curvy road through wooded area
Netskope is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Learn more
Switchback road atop a cliffside
Thinkers, builders, dreamers, innovators. Together, we deliver cutting-edge cloud security solutions to help our customers protect their data and people.

Meet our team
Group of hikers scaling a snowy mountain
Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.

Learn more
Group of diverse young professionals smiling
Press Release
April 28, 2014

Netskope Research Finds Blocking Cloud Apps at the Perimeter Out of Touch with Business Objectives

  • Enterprises use an average of 461 cloud applications, up from 397 in Q4 2013
  • 85 percent of cloud apps are not enterprise-ready
  • 90 percent of cloud app usage was in apps that were blocked at the perimeter but granted exceptions
  • The top policy violation was uploading to cloud storage

LOS ALTOS, Calif. – April 28, 2014 – Today, Netskope, the leader in cloud app analytics and policy enforcement, released the Netskope Cloud Report™ for April 2014. Using aggregated, anonymized data from the Netskope Active Platform, the report findings are based on billions of cloud app events seen across hundreds of thousands of users from January to March 2014. The findings reveal that 90 percent of usage was in apps that had been blocked by network perimeter appliances but had been granted exceptions. This trend of the exception being the rule suggests that wholesale blocking done by firewalls and secure web gateways isn’t practical and only creates a false sense of security.

The report also found that enterprises ran an average of 461 cloud apps, and 85 percent were not enterprise-ready, scoring a “medium” or below in the Netskope Cloud Confidence Index[1]. Since Netskope’s January 2014 Cloud Report™, there was a 14 percent increase in average number of apps used by enterprises (the number increased from 397 to 461). IT continues to approximate that 40-50 apps are in use by their employees, but they are underestimating usage by nine to 10 times.

“The writing is on the wall – enterprises are continuing to adopt cloud apps and are more invested than ever in protecting their data. We saw that enterprises who block apps with network perimeter technologies, like next-gen firewalls and secure web gateways, aren’t achieving their objectives because most of the usage is in the ‘exceptions,’” said Sanjay Beri, CEO and founder, Netskope. “We call this phenomenon ‘exception sprawl.’ If enterprises can learn one lesson from this report, it’s that the dam has broken on cloud app usage. To address this IT needs to leverage solutions that provide context around app usage and enact security controls at the user, device and activity level.”

Which Cloud Apps are Most Popular?

The report identified top apps used by enterprises, and found social and storage were the most frequently used categories based on number of app sessions.

Cloud AppCategory
1. TwitterSocial
2. FacebookSocial
3. BoxStorage/Collaboration
4. Amazon CloudDriveStorage
5. Microsoft Office 365Collaboration
6. Google DriveStorage
7. Google PlusSocial
8. DropboxStorage
9. LinkedInSocial
10. PinterestConsumer

What Happened in Cloud Apps?

Top activities in cloud apps included “create,” “edit,” “download,” “share” and “delete.” Activities such as downloading and sharing of data that may contain customer information, intellectual property or other proprietary information should be red flags for IT admins, as such activities can signal data leakage.

Where Did Policy Violations Occur?

IT has started to build policies around cloud app usage in an effort to enable, rather than block, cloud app usage in the enterprise, and to have more control over how information is shared and protected. The categories in which policy violations occurred most were storage, social, software development, finance/accounting and customer relationship management/sales force automation, with the vast majority being in storage. The activities that most often constituted policy violations were “upload,” “edit” and “post.” The most frequent violation was uploading to cloud storage apps specifically. While many enterprises adopted granular policies aimed at protecting data, one violation that did not rank highly was “login.” This data point indicates that as enterprises establish more granular usage policies that provide control over business-sensitive data, they can allow more users to log in with confidence and move away from the sledgehammer “block” approach.

Who Was Using Cloud Apps?

The top five app categories were marketing, HR, collaboration, storage and finance/accounting. Apps within these categories can contain sensitive information such as business intelligence or personally identifiable employee data. An average of 47 marketing apps, 41 HR apps and 27 finance/accounting apps were in use by organizations. These categories were also among the least enterprise-ready: 97 percent of marketing apps and 94 percent of both HR and finance/accounting apps rated “medium” or below in the Netskope Cloud Confidence Index™. Overall, 60 percent of cloud app usage occurred in non-enterprise-ready apps.

Netskope Resources

About Netskope

Netskope™ is the leader in cloud app analytics and policy enforcement. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility, enforcing sophisticated policies, and protecting data in cloud apps. The Netskope Active Platform performs deep analytics and lets decision-makers create policies in a few clicks that prevent the loss of sensitive data and optimize cloud app usage in real-time and at scale, whether IT manages the app or not. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence.

Netskope is headquartered in Los Altos, California. Visit us at www.netskope.com and follow us on Twitter @Netskope.


[1] The Netskope Cloud Confidence IndexTM is a database of nearly 4,500 cloud apps that are evaluated on 30+ objective enterprise-readiness criteria adapted from Cloud Security Alliance guidance, including security, auditability, and business continuity. The results of the evaluation are normalized to a 0-100 score and mapped to five levels from “poor” to “excellent.”